Unix security

Results: 312



#Item
291Backup / Data security / Nearline storage / EMC Symmetrix / Family Computer Disk System / Backup software / Computer data storage / Optical jukebox / Computer hardware / Computer storage / Computing

WHITE PAPER Backup Performance Gains with e-Spaceā„¢ for UNIX and MPE ________________________________________________________________________ 1. 2.

Add to Reading List

Source URL: www.solution-soft.com

Language: English - Date: 2000-09-12 14:11:33
292System administration / Computing / Unix security / Shadow password / Passwd / Group identifier / Su / Home directory / Password / System software / Unix / Software

RTF Document

Add to Reading List

Source URL: www.spy.net

Language: English - Date: 1998-04-07 23:15:13
293Computing / Firewall / Application firewall / Internet security / DMZ / Unix security / Antivirus software / Distributed firewall / Personal firewall / Computer network security / Computer security / Cyberwarfare

Internet Firewalls: Frequently Asked Questions Internet Firewalls:

Add to Reading List

Source URL: www.interhack.net

Language: English - Date: 2009-04-01 22:27:13
294System administration / Unix / Password / Computer network security / Cryptography / Shadow password / LM hash / Passwd / Network security / Security / Computer security / Cyberwarfare

(U) The 60 Minute Network Security Guide

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-12 13:18:02
295National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Trusted computing base / Discretionary access control / Access control / IBM AIX / TCB / Unix / Computer security / Security / Computer architecture

FINAL EVALUATION REPORT The IBM Corporation RS/6000 Distributed System

Add to Reading List

Source URL: www.ashtonlabs.com

Language: English - Date: 2008-08-20 17:11:02
296Internet protocols / Software / Network File System / File locking / WebNFS / Unix security / Remote File System / Server Message Block / Lustre / Network file systems / Computing / System software

Why NFS Sucks Olaf Kirch SUSE/Novell, Inc.

Add to Reading List

Source URL: www.landley.net

Language: English - Date: 2010-12-12 01:03:52
297Data security / Sendmail / Computer network security / Syslog / Daemon / Anomaly detection / Intrusion detection system / Artificial immune system / Email forwarding / Computing / Information technology management / System software

A Sense of Self for Unix Processes Stephanie Forrest Steven A. Hofmeyr

Add to Reading List

Source URL: webpages.math.luc.edu

Language: English - Date: 2008-06-17 14:44:54
298Computer network security / Operating system / Privilege escalation / Kernel / Vulnerability / Ring / Google Chrome OS / Denial-of-service attack / Unix / Computer security / Cyberwarfare / System software

GOOD PRACTICE GUIDE GENERAL ADVICE ON SECURING OPERATING SYSTEMS

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2012-07-20 06:03:57
299Unix / System administration / Cryptographic software / Privilege separation / OpenSSH / Privilege / Secure Shell / Principle of least privilege / Capability-based security / System software / Software / Computer security

Preventing Privilege Escalation Niels Provos CITI, University of Michigan

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2003-08-09 19:06:37
300Rootkits / Malware / Internet protocols / Internet standards / Computer security / Backdoor / Secure Shell / Hacker / Telnet / System software / Computing / Software

iALERT White Paper An Overview of Unix

Add to Reading List

Source URL: www.megasecurity.org

Language: English - Date: 2011-06-01 03:54:54
UPDATE